Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Camille Stewart Gloster on how AI systems can help you wade through log data and get more done

AI and machine learning are already being used in cybersecurity to help reduce the "noise of all the indicators" that security teams receive. These systems can serve as a "first line of defense" by setting up potential response actions. However, organizations need to ensure they keep human analysts in the loop because contextual knowledge and human judgment remain critical. Data Security Decoded is available on our YouTube channel!

What Healthcare Leaders Face After a Cyberattack

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with Errol Weiss, Chief Security Officer at Health-ISAC. Drawing on decades of experience across government, finance, and healthcare, Errol walks through what leaders actually face in the hours and weeks following a cyberattack. The conversation explores why healthcare remains a top ransomware target, how uncertainty shapes recovery decisions, and why trusted, anonymous information sharing has become one of the sector’s strongest defenses.

What is Agentic AI vs GenAI?

Everyone knows ChatGPT, but Agentic AI is where the real work happens. In this Agentic AI vs GenAI breakdown, we explain why Agentic AI is the next major leap, and what it means for your business and career. Here’s the difference: Generative AI (GenAI): Creates content. You ask, it writes, summarizes, or creates. Agentic AI: Does work. It is built on three core components: a brain (reasons), memory (context), and tools (the key that lets agents touch real systems like APIs and databases).

Daniel dos Santos on defending against opportunistic cyberattacks

Complicated, targeted attacks aren’t the only methods you should be on the lookout for. Security fundamentals are important for defending against opportunistic that can cause chaos! On this episode of Data Security Decoded, Daniel dos Santos (VP of Research, Forescout Technologies) and host Caleb Tolin explore attacker motivations, common entry points, and what defenders must prioritize now. Listen to the full episode on our YouTube channel, or wherever you get your podcasts.

Rubrik Agent Cloud Explained!

AI agents are active across your enterprise, yet most teams lack visibility into their actions or access to them. This video introduces Rubrik Agent Cloud, offering a Centralized Registry for full agent visibility and Policy-based Governance to monitor and block unauthorized actions in real time. And for the rogue agent, quickly undo damage with Agent Rewind.

AI Moves Fast, Privacy Has to Move Faster with Ojas Rege

In this episode, Caleb Tolin welcomes Ojas Rege of OneTrust for a practical, wide-ranging conversation on how data privacy and governance must evolve alongside enterprise AI adoption. Ojas explains why AI fundamentally changes the privacy conversation: the same systems that enable organizations to move faster can also cause harm faster when guardrails aren’t in place. From agentic AI systems that dynamically repurpose data to general-purpose models that blur traditional notions of “intended use,” the challenge isn’t just compliance—it’s trust.

Cyberattacks on Hospitals Are Attacks on Communities: Why Ransomware Is a Patient Safety Crisis

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with John Riggi, National Advisor for Cybersecurity and Risk at the American Hospital Association. Drawing on nearly 30 years at the FBI and his current work advising more than 5,000 hospitals, Riggi explains why ransomware attacks on healthcare should be treated as threat-to-life events. He breaks down the real-world consequences of cyberattacks, from ambulance diversion to delayed cancer care, and outlines what leaders must do now to prepare for outages that last weeks, not hours.

Amit Malik gives you an inside look at new attack methods being used by adversaries

Attackers are using AI and LLMs in unique ways to increase their capabilities and minimize their footprint; so how can defenders respond? Don’t miss this episode of Data Security Decoded with Amit Malik, a Staff Security Researcher at Rubrik Zero Labs, who gives you an inside look at new attack methods being used by adversaries. Get Data Security Decoded wherever you listen to your podcasts, or subscribe to our channel!